{"id":108792,"date":"2023-03-21t00:00:26","date_gmt":"2023-03-21t04:00:26","guid":{"rendered":"\/\/www.g005e.com\/?p=108792"},"modified":"2024-08-07t23:09:34","modified_gmt":"2024-08-08t03:09:34","slug":"phishing-attack-hackers-have-a-new-trick","status":"publish","type":"post","link":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/","title":{"rendered":"phishing attack hackers have a new trick"},"content":{"rendered":"

and it’s working. \"faceless<\/strong><\/span><\/p>\n

by rick richardson<\/em><\/p>\n

cybercriminals are experimenting with a new method of delivering dangerous payloads and employing targeted phishing emails to infect users with malware.<\/span><\/p>\n

according to a\u00a0<\/span>study by proofpoint<\/span><\/a>, digital onenote notebooks (denoted by \u201c.one\u201d extensions) are increasingly being used by cyber-attackers to spread malware. onenote is included in the microsoft 365 office software bundle and is a widely used piece of software.<\/span><\/p>\n

more tech this week:\u00a0 <\/b>chatgpt: what it is. why you need to know.<\/a>\u00a0|\u00a0russia-linked ransomware back with a vengeance<\/a>\u00a0|\u00a0amazon aws: the mainframe killer?<\/a>\u00a0|\u00a0amazon launching its first internet satellites<\/a>\u00a0|\u00a0russian solarwinds hackers at it again<\/a>\u00a0|\u00a0nasa finds a $10 quintillion asteroid<\/a>\u00a0|\u00a0firms must balance benefits, risks of emerging technology<\/a>\u00a0|\u00a0microsoft and google go to war<\/a>
\n\"goprocpa.com\"exclusively for pro members.\u00a0<\/strong>
log in here<\/a>\u00a0or\u00a02022世界杯足球排名 today<\/a>.<\/p><\/blockquote>\n

onenote documents are rarely misused in this manner, according to cybersecurity professionals, and there is only one clear reason attackers are experimenting with them: they can more readily avoid threat detection than other attachments. and it seems to be effective.<\/span><\/p>\n

<\/p>\n

according to statistics from open-source malware repositories, initially observed attachments were not identified as dangerous by several anti-virus engines. as a result, the original campaigns likely had a high success rate if the email was not stopped, according to proofpoint.<\/span><\/p>\n

proofpoint expanded on the study findings by saying, \u201dsince\u00a0microsoft began blocking macros\u00a0by default in 2022, threat actors have experimented with many new tactics, techniques, and procedures, including use of previously infrequently observed file types such as virtual hard disk (vhd), compiled html (chm), and now onenote (.one).”<\/p>\n

the phishing emails are attempting to deliver one of several malware payloads, including asyncrat, redline, agenttesla, and doubleback, all of which are designed to steal sensitive information from victims, including usernames and passwords. the phishing emails were first sent in december 2022, with the number significantly increasing in january 2023.<\/p>\n

researchers from proofpoint also report that a cybercriminal organization they track by the name of ta577 has used onenote in campaigns to distribute qbot. ta577 operates as an initial access broker, selling stolen usernames and passwords to other cybercriminals, including ransomware gangs, as opposed to stealing data for its own use.<\/p>\n

there have been over 60 of these campaigns found so far, and they all have the same traits. emails and file attachments are connected to topics like invoicing, remittances, shipping and seasonal themes, such as details on a christmas bonus, among others.<\/p>\n

for instance, attachment names in a phishing letter addressed to targets in the manufacturing and industrial sectors included references to machine parts and specifications, showing that the lure had undergone extensive investigation.<\/p>\n

other onenote efforts target thousands of potential victims simultaneously and are a little broader. one of these efforts used fake invoices to target the education industry, while another was more broadly disseminated and promised a christmas bonus or present to thousands of unsuspecting victims.<\/p>\n

the victim must open the email, open the onenote attachment, and click on any harmful links for the phishing scam to succeed in each instance. onenote does include a warning message regarding dangerous urls. still, users who have received an email that has been specifically tailored to appeal to them may attempt to ignore this warning.<\/p>\n

researchers caution that additional cyber-threat groups will probably use this strategy successfully to distribute phishing and malware campaigns because it is expected that these efforts will frequently succeed if the emails are not stopped.<\/p>\n

“proofpoint has increasingly observed onenote attachments being used to deliver malware. based on our research, we believe multiple threat actors are using onenote attachments to bypass threat detections,” said researchers, who warn that this is “concerning” because, as demonstrated by ta577, this tactic can become an initial entry point for distributing ransomware, which could cripple an entire organization and its networks.<\/p>\n

“this is a phishing technique that convinces a victim to open a document with an embedded malicious attachment and then bypass a security prompt to run the attachment. we encourage customers to\u00a0practice good computing habits online, including exercising caution when clicking on links to webpages or opening unknown files,” a microsoft spokesperson said.<\/p>\n

\"faceless<\/p>\n","protected":false},"excerpt":{"rendered":"

phishing attack hackers have a new trick<\/strong>
\n\"faceless
\nby rick richardson<\/em><\/p>\n","protected":false},"author":1373,"featured_media":40775,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[3120,3002,2306],"tags":[3445,3447,3477,120,629],"class_list":["post-108792","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pro-member-exclusive","category-special","category-tech-and-fintech","tag-ai","tag-artificial-intelligence","tag-chatgpt","tag-tech","tag-technology"],"acf":[],"yoast_head":"\nphishing attack hackers have a new trick - 卡塔尔世界杯常规比赛时间<\/title>\n<meta name=\"description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/\" \/>\n<meta property=\"og:locale\" content=\"en_us\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"phishing attack hackers have a new trick - 卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"og:description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta property=\"og:url\" content=\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/\" \/>\n<meta property=\"og:site_name\" content=\"卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cpatrendlines\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-21t04:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-08t03:09:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"rick richardson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:site\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:label1\" content=\"written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rick richardson\" \/>\n\t<meta name=\"twitter:label2\" content=\"est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"article\",\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#article\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/\"},\"author\":{\"name\":\"rick richardson\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/e2182d2686ef458f8ad30ccca8b6e8ba\"},\"headline\":\"phishing attack hackers have a new trick\",\"datepublished\":\"2023-03-21t04:00:26+00:00\",\"datemodified\":\"2024-08-08t03:09:34+00:00\",\"mainentityofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/\"},\"wordcount\":690,\"commentcount\":0,\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage\"},\"thumbnailurl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg\",\"keywords\":[\"ai\",\"artificial intelligence\",\"chatgpt\",\"tech\",\"technology\"],\"articlesection\":[\"pro member exclusive\",\"special\",\"tech and fintech\"],\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"commentaction\",\"name\":\"comment\",\"target\":[\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#respond\"]}]},{\"@type\":\"webpage\",\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/\",\"url\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/\",\"name\":\"phishing attack hackers have a new trick - 卡塔尔世界杯常规比赛时间\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/#website\"},\"primaryimageofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage\"},\"thumbnailurl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg\",\"datepublished\":\"2023-03-21t04:00:26+00:00\",\"datemodified\":\"2024-08-08t03:09:34+00:00\",\"description\":\"actionable intelligence for tax, accounting, and financial professionals\",\"breadcrumb\":{\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#breadcrumb\"},\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"readaction\",\"target\":[\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/\"]}]},{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg\",\"width\":1600,\"height\":1068,\"caption\":\"faceless hooded anonymous computer hacker with programming code from monitor\"},{\"@type\":\"breadcrumblist\",\"@id\":\"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#breadcrumb\",\"itemlistelement\":[{\"@type\":\"listitem\",\"position\":1,\"name\":\"home\",\"item\":\"\/\/www.g005e.com\/\"},{\"@type\":\"listitem\",\"position\":2,\"name\":\"featured\",\"item\":\"\/\/www.g005e.com\/category\/featured\/\"},{\"@type\":\"listitem\",\"position\":3,\"name\":\"phishing attack hackers have a new trick\"}]},{\"@type\":\"website\",\"@id\":\"\/\/www.g005e.com\/#website\",\"url\":\"\/\/www.g005e.com\/\",\"name\":\"卡塔尔世界杯常规比赛时间\",\"description\":\"actionable intelligence for the tax, accounting and finance community\",\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"potentialaction\":[{\"@type\":\"searchaction\",\"target\":{\"@type\":\"entrypoint\",\"urltemplate\":\"\/\/www.g005e.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"propertyvaluespecification\",\"valuerequired\":true,\"valuename\":\"search_term_string\"}}],\"inlanguage\":\"en-us\"},{\"@type\":\"organization\",\"@id\":\"\/\/www.g005e.com\/#organization\",\"name\":\"卡塔尔世界杯常规比赛时间 research\",\"alternatename\":\"cpatrendlines\",\"url\":\"\/\/www.g005e.com\/\",\"logo\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"width\":1600,\"height\":350,\"caption\":\"卡塔尔世界杯常规比赛时间 research\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\"},\"sameas\":[\"https:\/\/www.facebook.com\/cpatrendlines\",\"https:\/\/x.com\/cpa_trendlines\",\"https:\/\/www.linkedin.com\/groups\/115382\/\",\"https:\/\/www.youtube.com\/cpatrendlines\"]},{\"@type\":\"person\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/e2182d2686ef458f8ad30ccca8b6e8ba\",\"name\":\"rick richardson\",\"image\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/08\/rick-richardson-100x100.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/08\/rick-richardson-100x100.jpg\",\"caption\":\"rick richardson\"},\"description\":\"rick richardson, cpa.citp, cgma, is the ceo and founder of richardson media & technologies and editor and publisher of technology this week.\",\"sameas\":[\"http:\/\/technologythisweek.net\"],\"url\":\"\/\/www.g005e.com\/author\/rick-richardson\/\"}]}<\/script>\n<!-- \/ yoast seo plugin. -->","yoast_head_json":{"title":"phishing attack hackers have a new trick - 卡塔尔世界杯常规比赛时间","description":"actionable intelligence for tax, accounting, and financial professionals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/","og_locale":"en_us","og_type":"article","og_title":"phishing attack hackers have a new trick - 卡塔尔世界杯常规比赛时间","og_description":"actionable intelligence for tax, accounting, and financial professionals","og_url":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/","og_site_name":"卡塔尔世界杯常规比赛时间","article_publisher":"https:\/\/www.facebook.com\/cpatrendlines","article_published_time":"2023-03-21t04:00:26+00:00","article_modified_time":"2024-08-08t03:09:34+00:00","og_image":[{"width":1600,"height":1068,"url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg","type":"image\/jpeg"}],"author":"rick richardson","twitter_card":"summary_large_image","twitter_creator":"@cpa_trendlines","twitter_site":"@cpa_trendlines","twitter_misc":{"written by":"rick richardson","est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"article","@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#article","ispartof":{"@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/"},"author":{"name":"rick richardson","@id":"\/\/www.g005e.com\/#\/schema\/person\/e2182d2686ef458f8ad30ccca8b6e8ba"},"headline":"phishing attack hackers have a new trick","datepublished":"2023-03-21t04:00:26+00:00","datemodified":"2024-08-08t03:09:34+00:00","mainentityofpage":{"@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/"},"wordcount":690,"commentcount":0,"publisher":{"@id":"\/\/www.g005e.com\/#organization"},"image":{"@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage"},"thumbnailurl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg","keywords":["ai","artificial intelligence","chatgpt","tech","technology"],"articlesection":["pro member exclusive","special","tech and fintech"],"inlanguage":"en-us","potentialaction":[{"@type":"commentaction","name":"comment","target":["\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#respond"]}]},{"@type":"webpage","@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/","url":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/","name":"phishing attack hackers have a new trick - 卡塔尔世界杯常规比赛时间","ispartof":{"@id":"\/\/www.g005e.com\/#website"},"primaryimageofpage":{"@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage"},"image":{"@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage"},"thumbnailurl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg","datepublished":"2023-03-21t04:00:26+00:00","datemodified":"2024-08-08t03:09:34+00:00","description":"actionable intelligence for tax, accounting, and financial professionals","breadcrumb":{"@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#breadcrumb"},"inlanguage":"en-us","potentialaction":[{"@type":"readaction","target":["\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/"]}]},{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#primaryimage","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/hoodedhacker_dollarphotoclub_72269100.jpg","width":1600,"height":1068,"caption":"faceless hooded anonymous computer hacker with programming code from monitor"},{"@type":"breadcrumblist","@id":"\/\/www.g005e.com\/2023\/03\/21\/phishing-attack-hackers-have-a-new-trick\/#breadcrumb","itemlistelement":[{"@type":"listitem","position":1,"name":"home","item":"\/\/www.g005e.com\/"},{"@type":"listitem","position":2,"name":"featured","item":"\/\/www.g005e.com\/category\/featured\/"},{"@type":"listitem","position":3,"name":"phishing attack hackers have a new trick"}]},{"@type":"website","@id":"\/\/www.g005e.com\/#website","url":"\/\/www.g005e.com\/","name":"卡塔尔世界杯常规比赛时间","description":"actionable intelligence for the tax, accounting and finance community","publisher":{"@id":"\/\/www.g005e.com\/#organization"},"potentialaction":[{"@type":"searchaction","target":{"@type":"entrypoint","urltemplate":"\/\/www.g005e.com\/?s={search_term_string}"},"query-input":{"@type":"propertyvaluespecification","valuerequired":true,"valuename":"search_term_string"}}],"inlanguage":"en-us"},{"@type":"organization","@id":"\/\/www.g005e.com\/#organization","name":"卡塔尔世界杯常规比赛时间 research","alternatename":"cpatrendlines","url":"\/\/www.g005e.com\/","logo":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","width":1600,"height":350,"caption":"卡塔尔世界杯常规比赛时间 research"},"image":{"@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/"},"sameas":["https:\/\/www.facebook.com\/cpatrendlines","https:\/\/x.com\/cpa_trendlines","https:\/\/www.linkedin.com\/groups\/115382\/","https:\/\/www.youtube.com\/cpatrendlines"]},{"@type":"person","@id":"\/\/www.g005e.com\/#\/schema\/person\/e2182d2686ef458f8ad30ccca8b6e8ba","name":"rick richardson","image":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/person\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/08\/rick-richardson-100x100.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/08\/rick-richardson-100x100.jpg","caption":"rick richardson"},"description":"rick richardson, cpa.citp, cgma, is the ceo and founder of richardson media & technologies and editor and publisher of technology this week.","sameas":["http:\/\/technologythisweek.net"],"url":"\/\/www.g005e.com\/author\/rick-richardson\/"}]}},"_links":{"self":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/108792","targethints":{"allow":["get"]}}],"collection":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/comments?post=108792"}],"version-history":[{"count":3,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/108792\/revisions"}],"predecessor-version":[{"id":109228,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/108792\/revisions\/109228"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media\/40775"}],"wp:attachment":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media?parent=108792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/categories?post=108792"},{"taxonomy":"post_tag","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/tags?post=108792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}